The obfuscated endpoint (to which to send the restricted data) is in a string in the string array "f3774z"
2. The string is transformed by method "m4225z" and then method "m4224z" to compute the eventual endpoint
3. The methods of "m4224z "and "m4225z" that transform the string